CVE-2017-9805
highCVSS v3 Base Score
8.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score
94.3%
Exploitation probability in 30 days
Top 0% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Confidentiality
High
Integrity
High
Availability
High
Published: September 15, 2017 (3162 days ago)
Last Modified: April 21, 2026
Vendor: Apache
Source: NVD
⚠️ CISA Known Exploited Vulnerability
Added to KEV: 2021-11-03
Remediation Due: 2022-05-03 (⚠ 1472d overdue)
Vulnerability Report
Generated by CyberWatcher
Description
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
CWE
CWE-502Affected Products
apache strutscisco digital media managercisco hosted collaboration solutioncisco media experience enginecisco network performance analysiscisco video distribution suite for internet streamingnetapp oncommand balance